-
1
-
-
84914181696
-
-
Open Alliance SIG accessed 24.01.2014
-
Open Alliance SIG, "Broadr-reachr automotive ethernet standard," accessed 24.01.2014. [Online]. Available: http://www.opensig.org/
-
Broadr-reachr Automotive Ethernet Standard
-
-
-
2
-
-
84878059487
-
The need for security in distributed automotive systems
-
Barcelona, Spain, 19-21 February, César Benavente-Peces and Joaquim Filipe, Eds. SciTePress 2013
-
S. Seifert, M. Kucera, and T. Waas, "The need for security in distributed automotive systems," in PECCS 2013-Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems, Barcelona, Spain, 19-21 February, 2013, César Benavente-Peces and Joaquim Filipe, Eds. SciTePress, 2013
-
(2013)
PECCS 2013-Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems
-
-
Seifert, S.1
Kucera, M.2
Waas, T.3
-
3
-
-
84885965762
-
A survey of security threats and protection mechanisms in embedded automotive networks
-
Budapest and Hungary
-
I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, and Y. Laarouchi, "A survey of security threats and protection mechanisms in embedded automotive networks," in Proceedings of the 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Budapest and Hungary, 2013, pp. 1-12
-
(2013)
Proceedings of the 2nd Workshop on Open Resilient Human-aware Cyber-physical Systems (WORCS-2013), Co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013)
, pp. 1-12
-
-
Studnia, I.1
Nicomette, V.2
Alata, E.3
Deswarte, Y.4
Kaâniche, M.5
Laarouchi, Y.6
-
4
-
-
56449111413
-
Sniffing/replay attacks on can buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy
-
T. Hoppe and J. Dittmann, "Sniffing/replay attacks on can buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy," 2nd Workshop on Embedded Systems Security (WESS' 2007), 2007
-
(2007)
2nd Workshop on Embedded Systems Security (WESS' 2007)
-
-
Hoppe, T.1
Dittmann, J.2
-
5
-
-
84867586451
-
-
D-A-CH security 2011. [Klagenfurt]: syssec
-
T. Hoppe, F. Exler, and J. Dittmann, "Ids-signaturen für automotive cannetzwerke," in D-A-CH security 2011. [Klagenfurt]: syssec, 2011, pp. 55-66
-
(2011)
Ids-signaturen Für Automotive Cannetzwerke
, pp. 55-66
-
-
Hoppe, T.1
Exler, F.2
Dittmann, J.3
-
6
-
-
78649321196
-
Security threats to automotive can networks: Practical examples and selected short-term countermeasures
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive can networks: practical examples and selected short-term countermeasures," Reliability engineering & system safety, vol. 96, no. 1, pp. 11-25, 2011
-
(2011)
Reliability Engineering & System Safety
, vol.96
, Issue.1
, pp. 11-25
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
7
-
-
84859106202
-
Security in automotive bus systems
-
Marko Wolf, André Weimerskirch, Christof Paar, and Most Bluetooth, "Security in automotive bus systems," in in: Proceedings of the Workshop on Embedded Security in Cars (escar)'04, 2004
-
(2004)
Proceedings of the Workshop on Embedded Security in Cars (escar)'04
-
-
Wolf, M.1
Weimerskirch, A.2
Paar, C.3
Bluetooth, M.4
-
8
-
-
58149105785
-
A first simulation of attacks in the automotive network communications protocol flexray
-
E. Corchado, R. Zunino, P. Gastaldo, and Á. Herrero, Eds. Springer Berlin / Heidelberg
-
D. Nilsson, U. Larson, F. Picasso, and E. Jonsson, "A first simulation of attacks in the automotive network communications protocol flexray," in Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08, ser. Advances in Soft Computing, E. Corchado, R. Zunino, P. Gastaldo, and Á. Herrero, Eds. Springer Berlin / Heidelberg, 2009, vol. 53, pp. 84-91
-
(2009)
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08, Ser. Advances in Soft Computing
, vol.53
, pp. 84-91
-
-
Nilsson, D.1
Larson, U.2
Picasso, F.3
Jonsson, E.4
-
10
-
-
84914181694
-
Security of embedded automotive networks: State of the art and a research proposal
-
Matthieu ROY, Ed., Toulouse and France NA
-
I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaaniche, and Y. Laarouchi, "Security of embedded automotive networks: state of the art and a research proposal," in Proceedings of Workshop CARS (2nd Workshop on Critical Automotive applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, Matthieu ROY, Ed., Toulouse and France, 2013, p. NA
-
(2013)
Proceedings of Workshop CARS (2nd Workshop on Critical Automotive Applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security
-
-
Studnia, I.1
Nicomette, V.2
Alata, E.3
Deswarte, Y.4
Kaaniche, M.5
Laarouchi, Y.6
-
11
-
-
84914116015
-
Seis-sicherheit in eingebetteten ip-basierten systemen
-
M. Glass, D. Herrscher, H. Meier, M. Piastowski, and P. Schoo, "Seis-sicherheit in eingebetteten ip-basierten systemen," ATZelektronik, vol. 5, no. 1, pp. 50-55, 2010
-
(2010)
ATZelektronik
, vol.5
, Issue.1
, pp. 50-55
-
-
Glass, M.1
Herrscher, D.2
Meier, H.3
Piastowski, M.4
Schoo, P.5
-
12
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
Berlin and Heidelberg: Springer-Verlag
-
M. Wolf and T. Gendrullis, "Design, implementation, and evaluation of a vehicular hardware security module," in Proceedings of the 14th international conference on Information Security and Cryptology, ser. ICISC'11. Berlin and Heidelberg: Springer-Verlag, 2012, pp. 302-318
-
(2012)
Proceedings of the 14th International Conference on Information Security and Cryptology, Ser. ICISC'11
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
13
-
-
84914181693
-
-
GENIVI accessed 24.01
-
GENIVI, "Genivi alliance," accessed 24.01.2014. [Online]. Available: http://www.genivi.org/
-
(2014)
Genivi Alliance
-
-
-
14
-
-
84885584568
-
Security challenges in automotive hardware/software architecture design
-
San Jose and CA and USA: EDA Consortium
-
F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, and S. Chakraborty, "Security challenges in automotive hardware/software architecture design," in Proceedings of the Conference on Design, Automation and Test in Europe, ser. DATE '13. San Jose and CA and USA: EDA Consortium, 2013, pp. 458-463
-
(2013)
Proceedings of the Conference on Design, Automation and Test in Europe, Ser. DATE '13
, pp. 458-463
-
-
Sagstetter, F.1
Lukasiewycz, M.2
Steinhorst, S.3
Wolf, M.4
Bouard, A.5
Harris, W.R.6
Jha, S.7
Peyrin, T.8
Poschmann, A.9
Chakraborty, S.10
-
15
-
-
84877597380
-
Future cars: Necessity for an adaptive and distributed multiple independent levels of security architecture
-
New York and NY and USA: ACM
-
A. G. Camek, C. Buckl, and A. Knoll, "Future cars: necessity for an adaptive and distributed multiple independent levels of security architecture," in Proceedings of the 2nd ACM international conference on High confidence networked systems, ser. HiCoNS '13. New York and NY and USA: ACM, 2013, pp. 17-24
-
(2013)
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, Ser. HiCoNS '13
, pp. 17-24
-
-
Camek, A.G.1
Buckl, C.2
Knoll, A.3
-
16
-
-
78349261255
-
A structured approach to anomaly detection for in-vehicle networks
-
M. Muter, A. Groll, and F. Freiling, "A structured approach to anomaly detection for in-vehicle networks," in Information Assurance and Security (IAS), 2010 Sixth International Conference on, 2010, pp. 92-98
-
(2010)
Information Assurance and Security (IAS), 2010 Sixth International Conference on
, pp. 92-98
-
-
Muter, M.1
Groll, A.2
Freiling, F.3
-
17
-
-
84874531460
-
Automotive proxy-based security architecture for ce device integration
-
C. Borcea, P. Bellavista, C. Giannelli, T. Magedanz, and F. Schreiner, Eds. Springer Berlin Heidelberg
-
A. Bouard, J. Schanda, D. Herrscher, and C. Eckert, "Automotive proxy-based security architecture for ce device integration," in Mobile Wireless Middleware, Operating Systems, and Applications, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, C. Borcea, P. Bellavista, C. Giannelli, T. Magedanz, and F. Schreiner, Eds. Springer Berlin Heidelberg, 2013, vol. 65, pp. 62-76
-
(2013)
Mobile Wireless Middleware, Operating Systems, and Applications, Ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.65
, pp. 62-76
-
-
Bouard, A.1
Schanda, J.2
Herrscher, D.3
Eckert, C.4
-
18
-
-
84868676332
-
Architecture for secure tablet integration in automotive network
-
Springer Berlin Heidelberg
-
J. Joy, A. Raghu, and J. Joy, "Architecture for secure tablet integration in automotive network," in Proceedings of the FISITA 2012 World Automotive Congress, ser. Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013, vol. 194, pp. 683-692
-
(2013)
Proceedings of the FISITA 2012 World Automotive Congress, Ser. Lecture Notes in Electrical Engineering
, vol.194
, pp. 683-692
-
-
Joy, J.1
Raghu, A.2
Joy, J.3
-
20
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Berkeley and CA and USA: USENIX Association
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces," in Proceedings of the 20th USENIX conference on Security, ser. SEC'11. Berkeley and CA and USA: USENIX Association, 2011, pp. 6-6
-
(2011)
Proceedings of the 20th USENIX Conference on Security, Ser. SEC'11
, pp. 6-6
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
23
-
-
84948963210
-
Timed interfaces
-
A. Sangiovanni-Vincentelli and J. Sifakis, Eds. Springer Berlin Heidelberg
-
L. Alfaro, T. Henzinger, and M. Stoelinga, "Timed interfaces," in Embedded Software, ser. Lecture Notes in Computer Science, A. Sangiovanni-Vincentelli and J. Sifakis, Eds. Springer Berlin Heidelberg, 2002, vol. 2491, pp. 108-122
-
(2002)
Embedded Software, Ser. Lecture Notes in Computer Science
, vol.2491
, pp. 108-122
-
-
Alfaro, L.1
Henzinger, T.2
Stoelinga, M.3
-
24
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experimental security analysis of a modern automobile," in Security and Privacy (SP), 2010 IEEE Symposium on, 2010, pp. 447-462
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
26
-
-
55349095066
-
Adaptive dynamic reaction to automotive it security incidents using multimedia car environment
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Adaptive dynamic reaction to automotive it security incidents using multimedia car environment," in Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on, 2008, pp. 295-298.
-
(2008)
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on
, pp. 295-298
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
|